It’s basically impossible to talk about how to secure a computer system (or how to gain covert access to one) without talking about which account has which privilege, let along things like how to ensure an unbiased random number generator, or do an analysis of who has what without looking at an intersection of sets.

  • WoodScientist@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    8
    ·
    2 days ago

    So you’re telling me the NSA isn’t allowed to archive any communications with those banned words in them? If I’m a terrorist group, can I develop a communications protocol using those words and thus make my communications utterly untraceable by the NSA? 27 banned words. Map 26 of them to letters. Boom. Now you can send untraceable messages!